Want to get hired at Microsoft?

Security Researcher II

Microsoft

Herzliya, Tel Aviv District, IsraelOn Site

Original Job Summary

About the Security Researcher II Role

Microsoft's Cloud Apps and Identity Research (CAIR) team is seeking a Security Researcher II with expertise in identity based attacks and threats. This role focuses on analyzing authentication protocols and exploring identity based attack vectors to guide product and engineering teams.

Responsibilities

  • Analyze and understand authentication and network protocol internals.
  • Independently reproduce identity-based attacks for research purposes.
  • Examine identity logs and study current trends of identity attacks.
  • Collaborate with product and engineering teams on sensor design and detection ideas.
  • Support cybersecurity through expertise during security escalations and incidents.

Qualifications

The ideal candidate has at least 4+ years in security research, strong engineering skills in C/Python and proven expertise in Identity Security. A relevant B.Sc. or M.Sc. is required, and experience leading features from design through maintenance is highly valued.

Preferred Qualifications

Additional experience in offensive security research, recognized security research publications, and excellent interpersonal skills are a plus.

Key Skills/Competency

  • Identity Security
  • Authentication Protocols
  • Cloud Technologies
  • Network Security
  • Security Research
  • C/Python Development
  • Forensics
  • Incident Response
  • Threat Analysis
  • Collaboration

How to Get Hired at Microsoft

🎯 Tips for Getting Hired

  • Customize your resume: Tailor experiences to identity security research.
  • Showcase technical skills: Emphasize C/Python and protocol expertise.
  • Research Microsoft: Understand their culture and security priorities.
  • Prepare case studies: Highlight successful security research projects.

📝 Interview Preparation Advice

Technical Preparation

Review authentication protocols and identity logs.
Practice coding in C and Python.
Study forensic methodologies for identity attacks.
Analyze recent security research case studies.

Behavioral Questions

Describe a challenging project in research.
Discuss a time you collaborated on technical issues.
Explain your approach to incident response.
Share how you handle research setbacks.